Skip to main content

GSM Based Security Analysis for Add-SS Watermarking

  • Conference paper
Digital Watermarking (IWDW 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5450))

Included in the following conference series:

  • 1715 Accesses

Abstract

Attack to security of watermarking is to estimate secret keys used in watermarking communications. The security level of watermarking algorithms can be evaluated by Cramer-Rao Bound (CRB) for the estimation of secret keys. As a widely used method, Add-Spread-Spectrum (Add-SS) watermarking has drawn a lot of attention. Previous work on watermarking security is mainly based on the assumption that the host is Gaussian distributed and ignores the impact of the non-Gaussian characteristics of natural images. With the incorporation of Gaussian Scale Mixture (GSM) model for host signals, this paper presents a theoretical analysis on the security of the Add-SS watermarking algorithms. By giving the CRB and Modified Cramer-Rao Bound (MCRB) for the estimation of secret carriers under Known Message Attack (KMA) and Watermarked Only Attack (WOA), this paper also reveals the factors that may influence the security of Add-SS based watermarking algorithms. Results presented in this paper are very helpful for designing the new generation of secure and robust watermarking system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cayre, F., Fontaine, C., Furon, T.: Watermarking Security: Theory and Practice. IEEE Trans. Signal Processing 53, 3976–3987 (2005)

    Article  MathSciNet  Google Scholar 

  2. Kerckhoffs, A.: La Cryptographie Militaire. Journal des Militaries 9, 5–38 (1983)

    Google Scholar 

  3. Comesaña, P., Péres-Freire, L., Péres-González, F.: Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 146–160. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Elsevier Science, Amsterdam (2002)

    Google Scholar 

  5. Pérez-Freire, L., Pérez-González, F., Furon, T., Comesaña, P.: Security of Lattice-Based Data Hiding Against the Known Message Attack. IEEE Trans. Information Forensics and Security 1(4), 421–439 (2006)

    Article  Google Scholar 

  6. Ni, J.Q., Zhang, R.Y., Fang, C., Huang, J.W., Wang, C.T.: Watermarking Security Incorporating Natural Scene Statistics. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol. 5284, pp. 132–146. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  7. Wainwright, M.J., Simoncelli, E.P.: Scale Mixtures of Gaussians and the Statistics of Natural Images. In: Advances in Neural Information Processing Systems (NIPS*99), vol. 12, pp. 855–861. MIT Press, Cambridge (2000)

    Google Scholar 

  8. van Trees, H.L.: Detection, Estimation, and Modulation Theory. John Wiley and Sons, Chichester (1968)

    MATH  Google Scholar 

  9. Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley series in Telecommunications (1991)

    Google Scholar 

  10. Portilla, J., Strela, V., Wainwright, M.J., Simoncelli, E.P.: Image Denoising Using Scale Mixtures of Gaussians in the Wavelet Domain. IEEE Trans. On Image Processing 12(11), 1338–1351 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  11. Amari, S.I., Cardoso, J.F.: Blind Source Separation – Semiparametric Statistical Approach. IEEE Trans. Signal Processing 45(11), 2692–2700 (1997), Special issue on neural networks

    Article  Google Scholar 

  12. Stoica, P., Ng, B.C.: On the Craner-Rao Bound Under Parametric Constraints. IEEE Signal Processing Lett. 5(7), 177–179 (1998)

    Article  Google Scholar 

  13. D’Andrea, N.A., Mengli, U., Reggiannini, R.: The Modified Carmer-Rao Bound and its Application to Synchronization Problems. IEEE Trans. Commun. 42, 1391–1399 (1994)

    Article  Google Scholar 

  14. Chou, Y.-l.: Statistical Analysis, Holt International (1969)

    Google Scholar 

  15. Gini, F., Reggiannini, R., Mengali, U.: The Modified Cramer-Rao Bound in Vector Parameter Estimation. IEEE Trans. Commun. 46(1), 52–60 (1998)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, D., Ni, J., Lee, DJ., Huang, J. (2009). GSM Based Security Analysis for Add-SS Watermarking. In: Kim, HJ., Katzenbeisser, S., Ho, A.T.S. (eds) Digital Watermarking. IWDW 2008. Lecture Notes in Computer Science, vol 5450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04438-0_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04438-0_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04437-3

  • Online ISBN: 978-3-642-04438-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics